Description

With time, logins and passwords have become critical elements we need to remember to access the different websites and services we use daily. If we want to achieve good security, each of these credential sets should be unique.
We therefore created the Mooltipass, a physical password keeper that remembers and encrypts your credentials so you don't have to. With this device, you can generate and safely store long and complex passwords. A personal PIN locked smartcard allows the decryption of your credentials and ensures that only you have access to them. Simply visit a website and the device will ask for your confirmation to enter your credentials when login is required.
The Mooltipass is a standalone device connected through USB, is completely driver-less and is compatible with all major operating systems on PCs, Macs and Smartphones.

Details

Mooltipass is composed of one main device and a smartcard.

On the device are stored your AES-256 encrypted passwords. The smartcard is a read protected EEPROM that needs a PIN code to unlock its contents (AES-256 key + a few websites credentials). As with your credit card, too many tries will permanently lock the smart card.The mooltipass main components are: a smart card connector, an Arduino compatible microcontroller, a FLASH memory, an OLED screen and its touchscreen panel. The OLED screen provides good contrast and good visibility.

As there are only 3 days left before the end of our Kickstarter campaign we would like to thank you for your continued support. Our current funding level (295%) is a testament to that, and this last month has been amazing for us. We are thrilled to see that more than 1450 users chose to support our hard work and believe in the Mooltipass project!Many well known companies also contacted us and expressed interest in the Mini! They were particularly motivated by the fact that they could audit and modify the Mini source code to meet their specific requirements. You may also have noticed that we are currently testing Safari and Firefox support. In the following video you can see a demo of the Mini functioning with Chrome, Firefox and Safari side by side.

If you haven't done so already, keep in mind these are the last few days you'll be able to grab a Mooltipass Mini at a preferential price - after our campaign, the Mini will be priced around $85.Have a great week,Mathieu and The Development Team

The long wait is over: the Mooltipass Mini crowdfunding campaign is live on Kickstarter!We are extremely happy to present you with our final device, which has already passed FCC and CE certifications. This effectively means your device can be shipped to your door the moment it leaves the production chain!

Compared to the Mooltipass standard you know, the mini has the following advantages:

Smaller size: 79 x 37 x 12mm

Cheaper: $50 early bird price, $85 retail

Faster input method: clickable scroll wheel

More intuitive: we implemented your suggestions!

Scratch resistant: case made of anodized aluminum

There are only a limited quantity of early bird rewards so make sure to visit our campaign the very moment you receive this email!We would also like to take this opportunity to thank our 50 beta testers who relentlessly tested the Mooltipass Mini over the past several months, ensuring our device would suit everyone's needs while remaining intuitive to use.And lastly, we'd be eternally grateful if you could spread the Mooltipass word around you so that we can help everyone with our safe and secure password management solution!

We're extremely excited to announce that our current Mooltipass Mini beta testers program is going extremely well, and that a bit more than a week ago we started a Mooltipass Mini pre-production batch!

If everything goes well, in 2 or 3 weeks 30 units will be shipped to lucky individuals.

A little more than a month ago we announced that the development team and I were working hard on a small Mooltipass device.

Today we're extremely happy to send you the very first picture of our current prototype:

We're also glad to report our target retail price: $50 ! But now we need you.

As with our first Mooltipass device we are planning to work hand in hand with ~10 beta testers for the next few months to make sure that our device will please everyone. These prototypes will be manufactured, soldered and assembled by us so we created a quick form for you to apply to the beta testers program.

Don't hesitate to spread the word and send this form to your friends and family!

We'll also organize a (very small) first production run in (hopefully) less than two months, to prepare for our future crowdfunding campaign. As you can guess, we're looking forward to being able to send this new Mooltipass to you!

Have a nice weekend,

Mathieu & the Mooltipass Development Team

PS: As always, if you want to talk to the team and community, we're on #mooltipass on freenode.

Enjoy this project?

Discussions

Become a member

It was a pain to import my 300+ passwords from my keepass database to the mooltiapp, finally i used 'Actiona' to automate the insertion thing.I use the mini since 3 weeks now, a bit hard to leave my old habits of keepass, but very nice.

yes i've tried but as i remember the keepass format wasn't good or something was wrong when i was exporting/importingit was importing it half or something like that due to line break issues, unicode or something.. i don't really remember now.

This looks like a very handy device. Will it be available again soon? I'm going to build something similar to this with a Raspberry Pi Zero (for personal use), however having a pre-built one is quite interesting as well.

The fact that the secure chip card is an Atmel worries me a lot. Working at a security evaluation lab, I can tell you secure Atmel devices are known to be as leaky as a sieve. I can't give you any details as it's confidential, but let's just say that we use Atmel chips as a standard 'victim' to periodically test and validate our pen-testing equipment

Great project you guys have going here, I have to say that i'm extremely interested in something like this, but lets say you are a user with many multiple email accounts from the same host(gmail) , then how would this device go about deciding which one you log into?

Hi, I'm interested in smart card programming aswell. I'd love to directly work on the chips inside it instead of using javacards etc. Do you have any information on this subject. ie, how do you test your cards? is the firmware sent to a factory and they produce the cards? or can you upload new firmware to blank cards?

Not to burst your bubble but let me tell you why no one has ever made something similar. I work at a large hardware security evaluation lab, and I can tell you that without rigorous security evaluation and feedback, devices like this are almost sure to contain side-channel leaks and exploits. Even if every part is tested and certified, the final product may not be secure. We had companies having to re-evaluating things only because they swapped an innocent chip with a different footprint, for which the main PCB was re-routed. Evaluation of a simple PIN entry device can cost between $100,000 - $500,000. Especially with the publicity you're getting here and in China, there'll be attackers for sure. Probably safe for most people, but not for a commercial product.

I'll give you a free tip. Use temper-switches to detect entry and modification of the device. Usually they are placed around buttons so they can't be tapped electrically. Also don't leave space that attackers can inserts evesdrop/logging devices into.

Considering the tone of your comment: is it a reason not to try then?
This is why we are going the open hardware way. Perhaps concerned individuals like yourself will consider putting some of their time to either look at our code or go for a black box type of attack. We already have several pen-testers checking our security implementation, and we would love you to be one of them :)

Very nice project. Very professional project.
Please note that the AT88SC102 is NOT secure (www.break-ic.com). You can use the ATECC108 instead. An ARM cortex M3/M4 controller is preferred for main controller (good performance/cost ratio).
Do you also make a 'lastpass' browser add-on?

I know. Security is difficult. You have to choose a good security for a reasonable price. I don't know the exact price (I use the break-ic list only to see which components can be hacked), but I think the price is from 800USD up to a few thousand dollar.

Not sure if there's any interest but I have 50 AT88SC0404C atmel crypto cards from a previous project. They are unused and in the protective sleeve. All white, looks like they could be printed on. Feel free to email if anyone has interest. elliot.buller(AT)gmail.com

I understand. Hard to develop for a moving target. I have pcsc scripts with apdu packet examples to access data, setup crypto, etc. More storage space too. I'll try and buy one to do the port myself once they are commercial. Been meaning to repurpose the smartcards and this sounds like a good opportunity. (Also will work for many automated laundry systems ;) Sorry, off topic.

Maybe the concern with the use of an USB key is the accessibility of the datas, that are usually readable in all circumstances even using an encryption it might just ask a password to decrypt/use the USB key, as with a microcontroller datas may be harder to retreive thus more secure. That's mt little point of view on the use of USB. I must finally say the design of the 3D rendering is nice !

My only concern is the trade-off between security and convenience. This project gives much better security, but in order to access any web accounts we may have, we need to have the mooltipass with us. Are there plans to make a later revision that will just be a keychain-able USB drive? that way we dont need to add a whole new device to our daily tools (phone, wallet, keys, etc)?

That being said, I DO love this project and the direction yall have chosen, and you can expect me to be the first buyer or kickstarter funder!

Thanks a lot for the support! As for your questions, a smaller version might be designed in the future but it's not planned yet. Are you sure that in your case you'd need to carry the mooltipass all the time? For example I mostly do my browsing at home or at work, so in my case I'd use 2 mooltipass and one smartcard...

Well as a student, I find myself sitting in front of a different computer every few hours every day, where i log into many accounts i would like to keep secure. I can easily sit down in front of 20 different computers a week, and sometimes never come back to the same computer twice. Even if I could afford twenty multipasses and came back to the same twenty computers every week, i certainly couldnt trust leaving them there at all these public computers.

This is why i feel a more portable option may be necessary for people like me to fully adopt the multipass as a security solution.

Just my two cents, and as I said before, I do really like the project. Definitely good work done!